Internet Security

509 Words2 Pages

Internet Security

Discuss what allows Internet access to users, with particular reference to protection against threats: viruses, spamming, and hackers.

In our network design, Internet access will be granted through a centralized point located at the Los Angeles Data Center. Corporate policy dictates that the corporate internet connection is to be utilized for business purposes only, and use for any purpose other than a justifiable business need will result in disciplinary actions, or termination.

To help deter users from violating this policy, we have implemented a corporate firewall at the access point to the internet. To assist in the prevention of attacks from viruses, spam, and hackers, the following measures will be taken.

Ports

Common ports that are related to gaming and personal internet services will be shut down to prevent unauthorized access to the internet. Since our policy will be limited access, with a business need justification for access through a port, most of these ports will already be blocked.

POP3 mail – Port 110
Gaming (Ultima, Quake II & III, Fighter Ace II) – 5001-5010, 7775-7777, 27910-27960, 50000 – 51000

Anti-Virus

Norton Anti-Virus Corporate Edition will be part of the standard build for all PC’s (desktops, laptops, etc), and Servers. LiveUpdate will be employed to insure that timely definition updates take place. During login, a check will be made to verify that the definition files are up to date, if they are not, the user will be n...

More about Internet Security

Open Document